![SMC Networks 8612T2 - annexe 1 Management Manual Download Page 99](http://html1.mh-extra.com/html/smc-networks/8612t2-annexe-1/8612t2-annexe-1_management-manual_1300239099.webp)
U
SER
A
UTHENTICATION
3-49
already in the address table will be retained and will not age out. Any other
device that attempts to use the port will be prevented from accessing the
switch.
Command Usage
•
A secure port has the following restrictions:
- It cannot use port monitoring.
- It cannot be a multi-VLAN port.
- It cannot be used as a member of a static or dynamic trunk.
- It should not be connected to a network interconnection device.
•
If a port is disabled (shut down) due to a security violation, it must be
manually re-enabled from the Port/Port Configuration page
(page 3-83).
Command Attributes
•
Port
– Port number.
•
Name
– Descriptive text (page 4-168).
•
Action
– Indicates the action to be taken when a port security violation
is detected:
-
None
: No action should be taken. (This is the default.)
-
Trap
: Send an SNMP trap message.
-
Shutdown
: Disable the port.
-
Trap and Shutdown
: Send an SNMP trap message and disable the
port.
•
Security Status
– Enables or disables port security on the port.
(Default: Disabled)
•
Max MAC Count
– The maximum number of MAC addresses that
can be learned on a port. (Range: 0 - 20)
•
Trunk
– Trunk number if port is a member (page 3-87 and 3-89).
Summary of Contents for 8612T2 - annexe 1
Page 2: ......
Page 23: ...TABLES xix ...
Page 36: ...INTRODUCTION 1 10 ...
Page 50: ...INITIAL CONFIGURATION 2 14 ...
Page 161: ...PORT CONFIGURATION 3 111 Figure 3 48 Port Statistics Continued ...
Page 248: ...CONFIGURING THE SWITCH 3 198 ...
Page 542: ...TROUBLESHOOTING B 2 ...
Page 555: ......